Skip to main content

Authorization

This section of the tutorial provides an introduction to authorization using InterSystems security. After completing this part of the tutorial, you will be able to:

  • List the different types of database assets protected by the InterSystems security system.

  • Create users, roles, and privileges.

  • Grant privileges to users by assigning them to roles.

  • Use the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.

Note:

For in-depth discussion of authorization using InterSystems security, see About InterSystems Authorization. See also Assets and Resources, Privileges and Permissions, Roles, Users, and Services.

Feedback